A comprehensive survey on signcryption security mechanisms in wireless body area networks

S Hussain, SS Ullah, M Uddin, J Iqbal, CL Chen - Sensors, 2022 - mdpi.com
WBANs (Wireless Body Area Networks) are frequently depicted as a paradigm shift in
healthcare from traditional to modern E-Healthcare. The vitals of the patient signs by the …

Efficient heterogeneous signcryption scheme based on Edge Computing for Industrial Internet of Things

S Niu, H Shao, Y Su, C Wang - Journal of Systems Architecture, 2023 - Elsevier
In recent years, the Industrial Internet of Things (IIoT) has played an indispensable role in
the age of intelligence. The data of IIoT is extremely private and valuable. Therefore, privacy …

Types of lightweight cryptographies in current developments for resource constrained machine type communication devices: Challenges and opportunities

S Ullah, RZ Radzi, TM Yazdani, A Alshehri… - IEEE Access, 2022 - ieeexplore.ieee.org
Machine-type communication devices have become a vital part of the autonomous industrial
internet of things and industry 4.0. These autonomous resource-constrained devices share …

A provably secure data sharing scheme for smart gas distribution grid using fog computing

RY Patil, YH Patil, R Kachhoria, S Lonare - International Journal of …, 2022 - Springer
The concept of smart gas distribution grid implies to enhancing current gas distribution grids
by establishing continuous on request and bidirectional data interchange between metering …

Identity-based proxy signature with message recovery over NTRU lattice

F Wu, B Zhou, X Zhang - Entropy, 2023 - mdpi.com
Proxy signature is one of the important primitives of public-key cryptography and plays an
essential role in delivering security services in modern communications. However, existing …

Privacy-preserving mutual heterogeneous signcryption schemes based on 5G network slicing

S Niu, H Shao, Y Hu, S Zhou… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
With the wide application of 5G network, much research has been carried out in recent years
toward the 5G network slicing technology in order to save 5G network resources and satisfy …

A designated tester-based certificateless public key encryption with conjunctive keyword search for cloud-based MIoT in dynamic multi-user environment

VB Chenam, ST Ali - Journal of Information Security and Applications, 2023 - Elsevier
One of the essential technologies in the medical industry for achieving high performance
and accuracy is the Medical Internet of Things (MIoT). The MIoT technology processes a …

A novel efficient certificateless signature scheme for the prevention of content poisoning attack in named data networking-based internet of things

S Hussain, SS Ullah, A Gumaei, M Al-Rakhami… - IEEE …, 2021 - ieeexplore.ieee.org
Recently, Named Data Networking (NDN) has emerged as a popular and active Internet
architecture that addresses the issues of current host-centric communication. NDN is well …

Optimizing Deep Learning Model for Software Cost Estimation Using Hybrid Meta‐Heuristic Algorithmic Approach

CA ul Hassan, MS Khan, R Irfan, J Iqbal… - Computational …, 2022 - Wiley Online Library
Effective software cost estimation significantly contributes to decision‐making. The rising
trend of using nature‐inspired meta‐heuristic algorithms has been seen in software cost …

A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments

S Ullah, Z Jiangbin, MT Hussain, N Din, F Ullah… - Journal of Information …, 2022 - Elsevier
Abstract In modern cryptography, Light Weighted Environments (LWE) refer to low-
constrained environments (Pelzl et al., 2003) such as smartphones and other electronic …